Security assessment [[electronic resource] ] : case studies for implementing the NSA lAM / / Russ Rogers |
Autore | Rogers Russ |
Edizione | [3rd ed.] |
Pubbl/distr/stampa | Rockland, MA, : Syngress Publishing, c2004 |
Descrizione fisica | 1 online resource (465 p.) |
Disciplina | 005.8 |
Soggetto topico |
Computers - Access control
Information technology - Management |
ISBN |
1-281-05637-5
9786611056377 0-08-048082-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cover; Contents; Introduction; Chapter 1 Laying the Foundation for Your Assessment; Chapter 2 The Pre-Assessment Visit; Chapter 3 Determining the Organization's Information Criticality; Chapter 4 System Information Criticality; Chapter 5 The System Security Environment; Chapter 6 Understanding the Technical Assessment Plan; Chapter 7 Customer Activities; Chapter 8 Managing the Findings; Chapter 9 Leaving No Surprises; Chapter 10 Final Reporting; Chapter 11 Tying Up Loose Ends; Appendix A Forms, Worksheets, and Templates; Index; Related Titles |
Record Nr. | UNINA-9910780114003321 |
Rogers Russ | ||
Rockland, MA, : Syngress Publishing, c2004 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security assessment [[electronic resource] ] : case studies for implementing the NSA lAM / / Russ Rogers |
Autore | Rogers Russ |
Edizione | [3rd ed.] |
Pubbl/distr/stampa | Rockland, MA, : Syngress Publishing, c2004 |
Descrizione fisica | 1 online resource (465 p.) |
Disciplina | 005.8 |
Soggetto topico |
Computers - Access control
Information technology - Management |
ISBN |
1-281-05637-5
9786611056377 0-08-048082-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cover; Contents; Introduction; Chapter 1 Laying the Foundation for Your Assessment; Chapter 2 The Pre-Assessment Visit; Chapter 3 Determining the Organization's Information Criticality; Chapter 4 System Information Criticality; Chapter 5 The System Security Environment; Chapter 6 Understanding the Technical Assessment Plan; Chapter 7 Customer Activities; Chapter 8 Managing the Findings; Chapter 9 Leaving No Surprises; Chapter 10 Final Reporting; Chapter 11 Tying Up Loose Ends; Appendix A Forms, Worksheets, and Templates; Index; Related Titles |
Record Nr. | UNINA-9910816735503321 |
Rogers Russ | ||
Rockland, MA, : Syngress Publishing, c2004 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security assessment [electronic resource] : case studies for implementing the NSA IAM / Russ Rogers ... [et al.]. |
Pubbl/distr/stampa | Rockland, MA : Syngress, c2004 |
Descrizione fisica | xxxiv, 429 p. : ill. ; 24 cm. |
Disciplina | 005.8 |
Altri autori (Persone) | Rogers, Russ.author |
Soggetto topico |
Computer security
Computers - Access control Information technology - Security measures |
Soggetto genere / forma | Electronic books. |
ISBN |
9781932266962
1932266968 |
Formato | Risorse elettroniche |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Laying the foundation for your assessment; The pre-assessment visit; Determining the organizations information criticality -- system information criticality; The system security environment; Understanding the technical assessment plan; Customer activities; Managing the findings; Leaving no surprises; Final reporting; Tying up loose ends. |
Record Nr. | UNISALENTO-991003260989707536 |
Rockland, MA : Syngress, c2004 | ||
Risorse elettroniche | ||
Lo trovi qui: Univ. del Salento | ||
|
Amultidisciplinary introduction to information security / / edited by Stig F. Mjolsnes |
Edizione | [First edition.] |
Pubbl/distr/stampa | Boca Raton, FL : , : Chapman and Hall/CRC, an imprint of Taylor and Francis, , 2011 |
Descrizione fisica | 1 online resource (342 pages) : illustrations, tables, graphs |
Disciplina | 005.8 |
Collana | Discrete Mathematics and Its Applications |
Soggetto topico |
Computer security
Computer networks - Security measures Computers - Access control Multidisciplinary design optimization |
ISBN |
0-429-09661-5
1-4200-8590-5 |
Classificazione | COM059000COM043000TEC007000 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | chapter 1 Introduction / S -- F -- Mjølsnes -- chapter 2 Security Electronics / E -- J -- Aas -- chapter 3 Public Key Cryptography / S -- O -- Smalø -- chapter 4 Cryptographic Hash Functions / D -- Gligoroski -- chapter 5 Quantum Cryptography / D -- R -- Hjelme -- chapter 6 Cryptographic Protocols / S -- F -- Mjølsnes -- chapter 7 Public Key Distribution / S -- F -- Mjølsnes -- chapter 8 Wireless Network Access / S -- F -- Mjølsnes -- chapter 9 Mobile Security / J -- A -- Audestad -- chapter 10 A Lightweight Approach to Secure Software Engineering / M -- G -- Jaatun -- chapter 11 ICT Security Evaluation / S -- J -- Knapskog -- chapter 12 ICT and Forensic Science / S -- F -- Mjølsnes -- chapter 13 Risk Assessment / S -- Haugen -- chapter 14 Information Security Management—From Regulations to End Users / E -- Albrechtsen. |
Record Nr. | UNINA-9910792137803321 |
Boca Raton, FL : , : Chapman and Hall/CRC, an imprint of Taylor and Francis, , 2011 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Amultidisciplinary introduction to information security / / edited by Stig F. Mjolsnes |
Edizione | [First edition.] |
Pubbl/distr/stampa | Boca Raton, FL : , : Chapman and Hall/CRC, an imprint of Taylor and Francis, , 2011 |
Descrizione fisica | 1 online resource (342 pages) : illustrations, tables, graphs |
Disciplina | 005.8 |
Collana | Discrete Mathematics and Its Applications |
Soggetto topico |
Computer security
Computer networks - Security measures Computers - Access control Multidisciplinary design optimization |
ISBN |
0-429-09661-5
1-4200-8590-5 |
Classificazione | COM059000COM043000TEC007000 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | chapter 1 Introduction / S -- F -- Mjølsnes -- chapter 2 Security Electronics / E -- J -- Aas -- chapter 3 Public Key Cryptography / S -- O -- Smalø -- chapter 4 Cryptographic Hash Functions / D -- Gligoroski -- chapter 5 Quantum Cryptography / D -- R -- Hjelme -- chapter 6 Cryptographic Protocols / S -- F -- Mjølsnes -- chapter 7 Public Key Distribution / S -- F -- Mjølsnes -- chapter 8 Wireless Network Access / S -- F -- Mjølsnes -- chapter 9 Mobile Security / J -- A -- Audestad -- chapter 10 A Lightweight Approach to Secure Software Engineering / M -- G -- Jaatun -- chapter 11 ICT Security Evaluation / S -- J -- Knapskog -- chapter 12 ICT and Forensic Science / S -- F -- Mjølsnes -- chapter 13 Risk Assessment / S -- Haugen -- chapter 14 Information Security Management—From Regulations to End Users / E -- Albrechtsen. |
Record Nr. | UNINA-9910800065703321 |
Boca Raton, FL : , : Chapman and Hall/CRC, an imprint of Taylor and Francis, , 2011 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Amultidisciplinary introduction to information security / / edited by Stig F. Mjolsnes |
Edizione | [First edition.] |
Pubbl/distr/stampa | Boca Raton, FL : , : Chapman and Hall/CRC, an imprint of Taylor and Francis, , 2011 |
Descrizione fisica | 1 online resource (342 pages) : illustrations, tables, graphs |
Disciplina | 005.8 |
Collana | Discrete Mathematics and Its Applications |
Soggetto topico |
Computer security
Computer networks - Security measures Computers - Access control Multidisciplinary design optimization |
ISBN |
0-429-09661-5
1-4200-8590-5 |
Classificazione | COM059000COM043000TEC007000 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | chapter 1 Introduction / S -- F -- Mjølsnes -- chapter 2 Security Electronics / E -- J -- Aas -- chapter 3 Public Key Cryptography / S -- O -- Smalø -- chapter 4 Cryptographic Hash Functions / D -- Gligoroski -- chapter 5 Quantum Cryptography / D -- R -- Hjelme -- chapter 6 Cryptographic Protocols / S -- F -- Mjølsnes -- chapter 7 Public Key Distribution / S -- F -- Mjølsnes -- chapter 8 Wireless Network Access / S -- F -- Mjølsnes -- chapter 9 Mobile Security / J -- A -- Audestad -- chapter 10 A Lightweight Approach to Secure Software Engineering / M -- G -- Jaatun -- chapter 11 ICT Security Evaluation / S -- J -- Knapskog -- chapter 12 ICT and Forensic Science / S -- F -- Mjølsnes -- chapter 13 Risk Assessment / S -- Haugen -- chapter 14 Information Security Management—From Regulations to End Users / E -- Albrechtsen. |
Record Nr. | UNINA-9910808331203321 |
Boca Raton, FL : , : Chapman and Hall/CRC, an imprint of Taylor and Francis, , 2011 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Wired China : who's hand is on the switch : roundtable before the Congressional-Executive Commission on China, One Hundred Seventh Congress, second session, April 15, 2002 |
Disciplina | 004.67/8/0951 |
Soggetto topico |
Computers - Access control
Internet - China Freedom of information - China Computer security - China |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Wired China |
Record Nr. | UNINA-9910693909803321 |
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
At Work firewall / Matthew Strebe, Charles Perkins |
Autore | Strebe, Matthew |
Pubbl/distr/stampa | Milano : jackson libri, c2000 |
Descrizione fisica | xxxvi, 492 p. : ill. ; 23 cm |
Disciplina | 005.8 |
Altri autori (Persone) | Perkins, Charles Arthur, 1969-author |
Soggetto topico |
Computer networks - Security measures
Computers - Access control Firewalls (Computer security) |
ISBN | 8825617119 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | ita |
Record Nr. | UNISALENTO-991000355749707536 |
Strebe, Matthew | ||
Milano : jackson libri, c2000 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. del Salento | ||
|
WTMC '18 : Proceedings of the 2018 Workshop on Traffic Measurements for Cybersecurity / / ACM Digital Library ; Association for Computing Machinery-Digital Library |
Pubbl/distr/stampa | New York, NY : , : ACM, , 2018 |
Descrizione fisica | 1 online resource (57 pages) |
Disciplina | 005.8 |
Soggetto topico |
Computer security
Computers - Access control |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910376157203321 |
New York, NY : , : ACM, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|